pulumi-vault 5.21.0a1710160723__py3-none-any.whl → 6.5.0a1736836139__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (229) hide show
  1. pulumi_vault/__init__.py +52 -0
  2. pulumi_vault/_inputs.py +560 -0
  3. pulumi_vault/_utilities.py +41 -5
  4. pulumi_vault/ad/get_access_credentials.py +22 -7
  5. pulumi_vault/ad/secret_backend.py +14 -144
  6. pulumi_vault/ad/secret_library.py +14 -11
  7. pulumi_vault/ad/secret_role.py +12 -11
  8. pulumi_vault/alicloud/auth_backend_role.py +74 -192
  9. pulumi_vault/approle/auth_backend_login.py +12 -11
  10. pulumi_vault/approle/auth_backend_role.py +75 -193
  11. pulumi_vault/approle/auth_backend_role_secret_id.py +106 -11
  12. pulumi_vault/approle/get_auth_backend_role_id.py +18 -9
  13. pulumi_vault/audit.py +24 -27
  14. pulumi_vault/audit_request_header.py +11 -6
  15. pulumi_vault/auth_backend.py +64 -12
  16. pulumi_vault/aws/auth_backend_cert.py +12 -7
  17. pulumi_vault/aws/auth_backend_client.py +265 -24
  18. pulumi_vault/aws/auth_backend_config_identity.py +12 -11
  19. pulumi_vault/aws/auth_backend_identity_whitelist.py +18 -17
  20. pulumi_vault/aws/auth_backend_login.py +19 -22
  21. pulumi_vault/aws/auth_backend_role.py +75 -193
  22. pulumi_vault/aws/auth_backend_role_tag.py +12 -7
  23. pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -17
  24. pulumi_vault/aws/auth_backend_sts_role.py +12 -11
  25. pulumi_vault/aws/get_access_credentials.py +34 -7
  26. pulumi_vault/aws/get_static_access_credentials.py +19 -5
  27. pulumi_vault/aws/secret_backend.py +75 -7
  28. pulumi_vault/aws/secret_backend_role.py +183 -11
  29. pulumi_vault/aws/secret_backend_static_role.py +14 -11
  30. pulumi_vault/azure/_inputs.py +24 -0
  31. pulumi_vault/azure/auth_backend_config.py +151 -17
  32. pulumi_vault/azure/auth_backend_role.py +75 -193
  33. pulumi_vault/azure/backend.py +223 -29
  34. pulumi_vault/azure/backend_role.py +42 -41
  35. pulumi_vault/azure/get_access_credentials.py +39 -11
  36. pulumi_vault/azure/outputs.py +5 -0
  37. pulumi_vault/cert_auth_backend_role.py +87 -271
  38. pulumi_vault/config/__init__.pyi +5 -0
  39. pulumi_vault/config/_inputs.py +73 -0
  40. pulumi_vault/config/outputs.py +35 -0
  41. pulumi_vault/config/ui_custom_message.py +529 -0
  42. pulumi_vault/config/vars.py +5 -0
  43. pulumi_vault/consul/secret_backend.py +22 -25
  44. pulumi_vault/consul/secret_backend_role.py +14 -80
  45. pulumi_vault/database/_inputs.py +2770 -881
  46. pulumi_vault/database/outputs.py +721 -838
  47. pulumi_vault/database/secret_backend_connection.py +117 -114
  48. pulumi_vault/database/secret_backend_role.py +29 -24
  49. pulumi_vault/database/secret_backend_static_role.py +85 -15
  50. pulumi_vault/database/secrets_mount.py +425 -138
  51. pulumi_vault/egp_policy.py +16 -15
  52. pulumi_vault/gcp/_inputs.py +111 -0
  53. pulumi_vault/gcp/auth_backend.py +248 -35
  54. pulumi_vault/gcp/auth_backend_role.py +75 -271
  55. pulumi_vault/gcp/get_auth_backend_role.py +43 -9
  56. pulumi_vault/gcp/outputs.py +5 -0
  57. pulumi_vault/gcp/secret_backend.py +287 -16
  58. pulumi_vault/gcp/secret_impersonated_account.py +74 -17
  59. pulumi_vault/gcp/secret_roleset.py +29 -26
  60. pulumi_vault/gcp/secret_static_account.py +37 -34
  61. pulumi_vault/generic/endpoint.py +22 -21
  62. pulumi_vault/generic/get_secret.py +68 -12
  63. pulumi_vault/generic/secret.py +19 -14
  64. pulumi_vault/get_auth_backend.py +24 -11
  65. pulumi_vault/get_auth_backends.py +33 -11
  66. pulumi_vault/get_namespace.py +226 -0
  67. pulumi_vault/get_namespaces.py +153 -0
  68. pulumi_vault/get_nomad_access_token.py +31 -15
  69. pulumi_vault/get_policy_document.py +34 -23
  70. pulumi_vault/get_raft_autopilot_state.py +29 -14
  71. pulumi_vault/github/_inputs.py +55 -0
  72. pulumi_vault/github/auth_backend.py +17 -16
  73. pulumi_vault/github/outputs.py +5 -0
  74. pulumi_vault/github/team.py +14 -13
  75. pulumi_vault/github/user.py +14 -13
  76. pulumi_vault/identity/entity.py +18 -15
  77. pulumi_vault/identity/entity_alias.py +18 -15
  78. pulumi_vault/identity/entity_policies.py +24 -19
  79. pulumi_vault/identity/get_entity.py +40 -14
  80. pulumi_vault/identity/get_group.py +45 -13
  81. pulumi_vault/identity/get_oidc_client_creds.py +21 -11
  82. pulumi_vault/identity/get_oidc_openid_config.py +39 -13
  83. pulumi_vault/identity/get_oidc_public_keys.py +29 -14
  84. pulumi_vault/identity/group.py +50 -49
  85. pulumi_vault/identity/group_alias.py +14 -11
  86. pulumi_vault/identity/group_member_entity_ids.py +24 -74
  87. pulumi_vault/identity/group_member_group_ids.py +36 -27
  88. pulumi_vault/identity/group_policies.py +16 -15
  89. pulumi_vault/identity/mfa_duo.py +9 -8
  90. pulumi_vault/identity/mfa_login_enforcement.py +13 -8
  91. pulumi_vault/identity/mfa_okta.py +9 -8
  92. pulumi_vault/identity/mfa_pingid.py +5 -4
  93. pulumi_vault/identity/mfa_totp.py +5 -4
  94. pulumi_vault/identity/oidc.py +12 -11
  95. pulumi_vault/identity/oidc_assignment.py +22 -13
  96. pulumi_vault/identity/oidc_client.py +34 -25
  97. pulumi_vault/identity/oidc_key.py +28 -19
  98. pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -19
  99. pulumi_vault/identity/oidc_provider.py +34 -23
  100. pulumi_vault/identity/oidc_role.py +40 -27
  101. pulumi_vault/identity/oidc_scope.py +18 -15
  102. pulumi_vault/identity/outputs.py +8 -3
  103. pulumi_vault/jwt/_inputs.py +55 -0
  104. pulumi_vault/jwt/auth_backend.py +39 -46
  105. pulumi_vault/jwt/auth_backend_role.py +131 -260
  106. pulumi_vault/jwt/outputs.py +5 -0
  107. pulumi_vault/kmip/secret_backend.py +22 -21
  108. pulumi_vault/kmip/secret_role.py +12 -11
  109. pulumi_vault/kmip/secret_scope.py +12 -11
  110. pulumi_vault/kubernetes/auth_backend_config.py +55 -7
  111. pulumi_vault/kubernetes/auth_backend_role.py +68 -179
  112. pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
  113. pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
  114. pulumi_vault/kubernetes/get_service_account_token.py +39 -15
  115. pulumi_vault/kubernetes/secret_backend.py +314 -29
  116. pulumi_vault/kubernetes/secret_backend_role.py +135 -56
  117. pulumi_vault/kv/_inputs.py +36 -4
  118. pulumi_vault/kv/get_secret.py +23 -12
  119. pulumi_vault/kv/get_secret_subkeys_v2.py +31 -14
  120. pulumi_vault/kv/get_secret_v2.py +89 -9
  121. pulumi_vault/kv/get_secrets_list.py +22 -15
  122. pulumi_vault/kv/get_secrets_list_v2.py +35 -19
  123. pulumi_vault/kv/outputs.py +8 -3
  124. pulumi_vault/kv/secret.py +19 -18
  125. pulumi_vault/kv/secret_backend_v2.py +12 -11
  126. pulumi_vault/kv/secret_v2.py +55 -52
  127. pulumi_vault/ldap/auth_backend.py +125 -168
  128. pulumi_vault/ldap/auth_backend_group.py +12 -11
  129. pulumi_vault/ldap/auth_backend_user.py +12 -11
  130. pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
  131. pulumi_vault/ldap/get_static_credentials.py +24 -5
  132. pulumi_vault/ldap/secret_backend.py +352 -84
  133. pulumi_vault/ldap/secret_backend_dynamic_role.py +12 -11
  134. pulumi_vault/ldap/secret_backend_library_set.py +14 -11
  135. pulumi_vault/ldap/secret_backend_static_role.py +67 -12
  136. pulumi_vault/managed/_inputs.py +289 -132
  137. pulumi_vault/managed/keys.py +27 -43
  138. pulumi_vault/managed/outputs.py +89 -132
  139. pulumi_vault/mfa_duo.py +16 -13
  140. pulumi_vault/mfa_okta.py +16 -13
  141. pulumi_vault/mfa_pingid.py +16 -13
  142. pulumi_vault/mfa_totp.py +22 -19
  143. pulumi_vault/mongodbatlas/secret_backend.py +18 -17
  144. pulumi_vault/mongodbatlas/secret_role.py +41 -38
  145. pulumi_vault/mount.py +389 -65
  146. pulumi_vault/namespace.py +26 -21
  147. pulumi_vault/nomad_secret_backend.py +16 -15
  148. pulumi_vault/nomad_secret_role.py +12 -11
  149. pulumi_vault/okta/_inputs.py +47 -8
  150. pulumi_vault/okta/auth_backend.py +483 -41
  151. pulumi_vault/okta/auth_backend_group.py +12 -11
  152. pulumi_vault/okta/auth_backend_user.py +12 -11
  153. pulumi_vault/okta/outputs.py +13 -8
  154. pulumi_vault/outputs.py +5 -0
  155. pulumi_vault/password_policy.py +18 -15
  156. pulumi_vault/pkisecret/__init__.py +3 -0
  157. pulumi_vault/pkisecret/_inputs.py +81 -0
  158. pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
  159. pulumi_vault/pkisecret/backend_config_est.py +619 -0
  160. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  161. pulumi_vault/pkisecret/get_backend_issuer.py +63 -7
  162. pulumi_vault/pkisecret/get_backend_issuers.py +21 -12
  163. pulumi_vault/pkisecret/get_backend_key.py +24 -13
  164. pulumi_vault/pkisecret/get_backend_keys.py +21 -12
  165. pulumi_vault/pkisecret/outputs.py +69 -0
  166. pulumi_vault/pkisecret/secret_backend_cert.py +18 -15
  167. pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -15
  168. pulumi_vault/pkisecret/secret_backend_config_issuers.py +12 -11
  169. pulumi_vault/pkisecret/secret_backend_config_urls.py +59 -11
  170. pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -13
  171. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -15
  172. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -21
  173. pulumi_vault/pkisecret/secret_backend_issuer.py +12 -11
  174. pulumi_vault/pkisecret/secret_backend_key.py +12 -7
  175. pulumi_vault/pkisecret/secret_backend_role.py +19 -16
  176. pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -52
  177. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -62
  178. pulumi_vault/pkisecret/secret_backend_sign.py +18 -60
  179. pulumi_vault/plugin.py +595 -0
  180. pulumi_vault/plugin_pinned_version.py +298 -0
  181. pulumi_vault/policy.py +12 -7
  182. pulumi_vault/provider.py +48 -53
  183. pulumi_vault/pulumi-plugin.json +2 -1
  184. pulumi_vault/quota_lease_count.py +58 -8
  185. pulumi_vault/quota_rate_limit.py +54 -4
  186. pulumi_vault/rabbitmq/_inputs.py +61 -0
  187. pulumi_vault/rabbitmq/outputs.py +5 -0
  188. pulumi_vault/rabbitmq/secret_backend.py +16 -15
  189. pulumi_vault/rabbitmq/secret_backend_role.py +52 -49
  190. pulumi_vault/raft_autopilot.py +12 -11
  191. pulumi_vault/raft_snapshot_agent_config.py +121 -311
  192. pulumi_vault/rgp_policy.py +14 -13
  193. pulumi_vault/saml/auth_backend.py +20 -19
  194. pulumi_vault/saml/auth_backend_role.py +90 -199
  195. pulumi_vault/secrets/__init__.py +3 -0
  196. pulumi_vault/secrets/_inputs.py +110 -0
  197. pulumi_vault/secrets/outputs.py +94 -0
  198. pulumi_vault/secrets/sync_association.py +56 -75
  199. pulumi_vault/secrets/sync_aws_destination.py +240 -29
  200. pulumi_vault/secrets/sync_azure_destination.py +90 -33
  201. pulumi_vault/secrets/sync_config.py +7 -6
  202. pulumi_vault/secrets/sync_gcp_destination.py +156 -27
  203. pulumi_vault/secrets/sync_gh_destination.py +187 -15
  204. pulumi_vault/secrets/sync_github_apps.py +375 -0
  205. pulumi_vault/secrets/sync_vercel_destination.py +72 -15
  206. pulumi_vault/ssh/_inputs.py +28 -32
  207. pulumi_vault/ssh/outputs.py +11 -32
  208. pulumi_vault/ssh/secret_backend_ca.py +106 -11
  209. pulumi_vault/ssh/secret_backend_role.py +83 -120
  210. pulumi_vault/terraformcloud/secret_backend.py +5 -56
  211. pulumi_vault/terraformcloud/secret_creds.py +14 -24
  212. pulumi_vault/terraformcloud/secret_role.py +14 -76
  213. pulumi_vault/token.py +26 -25
  214. pulumi_vault/tokenauth/auth_backend_role.py +76 -201
  215. pulumi_vault/transform/alphabet.py +16 -13
  216. pulumi_vault/transform/get_decode.py +45 -21
  217. pulumi_vault/transform/get_encode.py +45 -21
  218. pulumi_vault/transform/role.py +16 -13
  219. pulumi_vault/transform/template.py +30 -25
  220. pulumi_vault/transform/transformation.py +12 -7
  221. pulumi_vault/transit/get_decrypt.py +26 -25
  222. pulumi_vault/transit/get_encrypt.py +24 -19
  223. pulumi_vault/transit/secret_backend_key.py +25 -97
  224. pulumi_vault/transit/secret_cache_config.py +12 -11
  225. {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/METADATA +8 -7
  226. pulumi_vault-6.5.0a1736836139.dist-info/RECORD +256 -0
  227. {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/WHEEL +1 -1
  228. pulumi_vault-5.21.0a1710160723.dist-info/RECORD +0 -244
  229. {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/top_level.txt +0 -0
@@ -0,0 +1,298 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import copy
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from . import _utilities
16
+
17
+ __all__ = ['PluginPinnedVersionArgs', 'PluginPinnedVersion']
18
+
19
+ @pulumi.input_type
20
+ class PluginPinnedVersionArgs:
21
+ def __init__(__self__, *,
22
+ type: pulumi.Input[str],
23
+ version: pulumi.Input[str],
24
+ name: Optional[pulumi.Input[str]] = None):
25
+ """
26
+ The set of arguments for constructing a PluginPinnedVersion resource.
27
+ :param pulumi.Input[str] type: Type of plugin; one of "auth", "secret", or "database".
28
+ :param pulumi.Input[str] version: Semantic version of the plugin to pin.
29
+ :param pulumi.Input[str] name: Name of the plugin.
30
+ """
31
+ pulumi.set(__self__, "type", type)
32
+ pulumi.set(__self__, "version", version)
33
+ if name is not None:
34
+ pulumi.set(__self__, "name", name)
35
+
36
+ @property
37
+ @pulumi.getter
38
+ def type(self) -> pulumi.Input[str]:
39
+ """
40
+ Type of plugin; one of "auth", "secret", or "database".
41
+ """
42
+ return pulumi.get(self, "type")
43
+
44
+ @type.setter
45
+ def type(self, value: pulumi.Input[str]):
46
+ pulumi.set(self, "type", value)
47
+
48
+ @property
49
+ @pulumi.getter
50
+ def version(self) -> pulumi.Input[str]:
51
+ """
52
+ Semantic version of the plugin to pin.
53
+ """
54
+ return pulumi.get(self, "version")
55
+
56
+ @version.setter
57
+ def version(self, value: pulumi.Input[str]):
58
+ pulumi.set(self, "version", value)
59
+
60
+ @property
61
+ @pulumi.getter
62
+ def name(self) -> Optional[pulumi.Input[str]]:
63
+ """
64
+ Name of the plugin.
65
+ """
66
+ return pulumi.get(self, "name")
67
+
68
+ @name.setter
69
+ def name(self, value: Optional[pulumi.Input[str]]):
70
+ pulumi.set(self, "name", value)
71
+
72
+
73
+ @pulumi.input_type
74
+ class _PluginPinnedVersionState:
75
+ def __init__(__self__, *,
76
+ name: Optional[pulumi.Input[str]] = None,
77
+ type: Optional[pulumi.Input[str]] = None,
78
+ version: Optional[pulumi.Input[str]] = None):
79
+ """
80
+ Input properties used for looking up and filtering PluginPinnedVersion resources.
81
+ :param pulumi.Input[str] name: Name of the plugin.
82
+ :param pulumi.Input[str] type: Type of plugin; one of "auth", "secret", or "database".
83
+ :param pulumi.Input[str] version: Semantic version of the plugin to pin.
84
+ """
85
+ if name is not None:
86
+ pulumi.set(__self__, "name", name)
87
+ if type is not None:
88
+ pulumi.set(__self__, "type", type)
89
+ if version is not None:
90
+ pulumi.set(__self__, "version", version)
91
+
92
+ @property
93
+ @pulumi.getter
94
+ def name(self) -> Optional[pulumi.Input[str]]:
95
+ """
96
+ Name of the plugin.
97
+ """
98
+ return pulumi.get(self, "name")
99
+
100
+ @name.setter
101
+ def name(self, value: Optional[pulumi.Input[str]]):
102
+ pulumi.set(self, "name", value)
103
+
104
+ @property
105
+ @pulumi.getter
106
+ def type(self) -> Optional[pulumi.Input[str]]:
107
+ """
108
+ Type of plugin; one of "auth", "secret", or "database".
109
+ """
110
+ return pulumi.get(self, "type")
111
+
112
+ @type.setter
113
+ def type(self, value: Optional[pulumi.Input[str]]):
114
+ pulumi.set(self, "type", value)
115
+
116
+ @property
117
+ @pulumi.getter
118
+ def version(self) -> Optional[pulumi.Input[str]]:
119
+ """
120
+ Semantic version of the plugin to pin.
121
+ """
122
+ return pulumi.get(self, "version")
123
+
124
+ @version.setter
125
+ def version(self, value: Optional[pulumi.Input[str]]):
126
+ pulumi.set(self, "version", value)
127
+
128
+
129
+ class PluginPinnedVersion(pulumi.CustomResource):
130
+ @overload
131
+ def __init__(__self__,
132
+ resource_name: str,
133
+ opts: Optional[pulumi.ResourceOptions] = None,
134
+ name: Optional[pulumi.Input[str]] = None,
135
+ type: Optional[pulumi.Input[str]] = None,
136
+ version: Optional[pulumi.Input[str]] = None,
137
+ __props__=None):
138
+ """
139
+ ## Example Usage
140
+
141
+ ```python
142
+ import pulumi
143
+ import pulumi_vault as vault
144
+
145
+ jwt = vault.Plugin("jwt",
146
+ type="auth",
147
+ name="jwt",
148
+ command="vault-plugin-auth-jwt",
149
+ version="v0.17.0",
150
+ sha256="6bd0a803ed742aa3ce35e4fa23d2c8d550e6c1567bf63410cec489c28b68b0fc",
151
+ envs=["HTTP_PROXY=http://proxy.example.com:8080"])
152
+ jwt_pin = vault.PluginPinnedVersion("jwt_pin",
153
+ type=jwt.type,
154
+ name=jwt.name,
155
+ version=jwt.version)
156
+ jwt_auth = vault.AuthBackend("jwt_auth", type=jwt_pin.name)
157
+ ```
158
+
159
+ ## Import
160
+
161
+ Pinned plugin versions can be imported using `type/name` as the ID, e.g.
162
+
163
+ ```sh
164
+ $ pulumi import vault:index/pluginPinnedVersion:PluginPinnedVersion jwt_pin auth/jwt
165
+ ```
166
+
167
+ :param str resource_name: The name of the resource.
168
+ :param pulumi.ResourceOptions opts: Options for the resource.
169
+ :param pulumi.Input[str] name: Name of the plugin.
170
+ :param pulumi.Input[str] type: Type of plugin; one of "auth", "secret", or "database".
171
+ :param pulumi.Input[str] version: Semantic version of the plugin to pin.
172
+ """
173
+ ...
174
+ @overload
175
+ def __init__(__self__,
176
+ resource_name: str,
177
+ args: PluginPinnedVersionArgs,
178
+ opts: Optional[pulumi.ResourceOptions] = None):
179
+ """
180
+ ## Example Usage
181
+
182
+ ```python
183
+ import pulumi
184
+ import pulumi_vault as vault
185
+
186
+ jwt = vault.Plugin("jwt",
187
+ type="auth",
188
+ name="jwt",
189
+ command="vault-plugin-auth-jwt",
190
+ version="v0.17.0",
191
+ sha256="6bd0a803ed742aa3ce35e4fa23d2c8d550e6c1567bf63410cec489c28b68b0fc",
192
+ envs=["HTTP_PROXY=http://proxy.example.com:8080"])
193
+ jwt_pin = vault.PluginPinnedVersion("jwt_pin",
194
+ type=jwt.type,
195
+ name=jwt.name,
196
+ version=jwt.version)
197
+ jwt_auth = vault.AuthBackend("jwt_auth", type=jwt_pin.name)
198
+ ```
199
+
200
+ ## Import
201
+
202
+ Pinned plugin versions can be imported using `type/name` as the ID, e.g.
203
+
204
+ ```sh
205
+ $ pulumi import vault:index/pluginPinnedVersion:PluginPinnedVersion jwt_pin auth/jwt
206
+ ```
207
+
208
+ :param str resource_name: The name of the resource.
209
+ :param PluginPinnedVersionArgs args: The arguments to use to populate this resource's properties.
210
+ :param pulumi.ResourceOptions opts: Options for the resource.
211
+ """
212
+ ...
213
+ def __init__(__self__, resource_name: str, *args, **kwargs):
214
+ resource_args, opts = _utilities.get_resource_args_opts(PluginPinnedVersionArgs, pulumi.ResourceOptions, *args, **kwargs)
215
+ if resource_args is not None:
216
+ __self__._internal_init(resource_name, opts, **resource_args.__dict__)
217
+ else:
218
+ __self__._internal_init(resource_name, *args, **kwargs)
219
+
220
+ def _internal_init(__self__,
221
+ resource_name: str,
222
+ opts: Optional[pulumi.ResourceOptions] = None,
223
+ name: Optional[pulumi.Input[str]] = None,
224
+ type: Optional[pulumi.Input[str]] = None,
225
+ version: Optional[pulumi.Input[str]] = None,
226
+ __props__=None):
227
+ opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
228
+ if not isinstance(opts, pulumi.ResourceOptions):
229
+ raise TypeError('Expected resource options to be a ResourceOptions instance')
230
+ if opts.id is None:
231
+ if __props__ is not None:
232
+ raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
233
+ __props__ = PluginPinnedVersionArgs.__new__(PluginPinnedVersionArgs)
234
+
235
+ __props__.__dict__["name"] = name
236
+ if type is None and not opts.urn:
237
+ raise TypeError("Missing required property 'type'")
238
+ __props__.__dict__["type"] = type
239
+ if version is None and not opts.urn:
240
+ raise TypeError("Missing required property 'version'")
241
+ __props__.__dict__["version"] = version
242
+ super(PluginPinnedVersion, __self__).__init__(
243
+ 'vault:index/pluginPinnedVersion:PluginPinnedVersion',
244
+ resource_name,
245
+ __props__,
246
+ opts)
247
+
248
+ @staticmethod
249
+ def get(resource_name: str,
250
+ id: pulumi.Input[str],
251
+ opts: Optional[pulumi.ResourceOptions] = None,
252
+ name: Optional[pulumi.Input[str]] = None,
253
+ type: Optional[pulumi.Input[str]] = None,
254
+ version: Optional[pulumi.Input[str]] = None) -> 'PluginPinnedVersion':
255
+ """
256
+ Get an existing PluginPinnedVersion resource's state with the given name, id, and optional extra
257
+ properties used to qualify the lookup.
258
+
259
+ :param str resource_name: The unique name of the resulting resource.
260
+ :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
261
+ :param pulumi.ResourceOptions opts: Options for the resource.
262
+ :param pulumi.Input[str] name: Name of the plugin.
263
+ :param pulumi.Input[str] type: Type of plugin; one of "auth", "secret", or "database".
264
+ :param pulumi.Input[str] version: Semantic version of the plugin to pin.
265
+ """
266
+ opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
267
+
268
+ __props__ = _PluginPinnedVersionState.__new__(_PluginPinnedVersionState)
269
+
270
+ __props__.__dict__["name"] = name
271
+ __props__.__dict__["type"] = type
272
+ __props__.__dict__["version"] = version
273
+ return PluginPinnedVersion(resource_name, opts=opts, __props__=__props__)
274
+
275
+ @property
276
+ @pulumi.getter
277
+ def name(self) -> pulumi.Output[str]:
278
+ """
279
+ Name of the plugin.
280
+ """
281
+ return pulumi.get(self, "name")
282
+
283
+ @property
284
+ @pulumi.getter
285
+ def type(self) -> pulumi.Output[str]:
286
+ """
287
+ Type of plugin; one of "auth", "secret", or "database".
288
+ """
289
+ return pulumi.get(self, "type")
290
+
291
+ @property
292
+ @pulumi.getter
293
+ def version(self) -> pulumi.Output[str]:
294
+ """
295
+ Semantic version of the plugin to pin.
296
+ """
297
+ return pulumi.get(self, "version")
298
+
pulumi_vault/policy.py CHANGED
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from . import _utilities
11
16
 
12
17
  __all__ = ['PolicyArgs', 'Policy']
@@ -23,7 +28,7 @@ class PolicyArgs:
23
28
  :param pulumi.Input[str] name: The name of the policy
24
29
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
25
30
  The value should not contain leading or trailing forward slashes.
26
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
31
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
27
32
  *Available only for Vault Enterprise*.
28
33
  """
29
34
  pulumi.set(__self__, "policy", policy)
@@ -62,7 +67,7 @@ class PolicyArgs:
62
67
  """
63
68
  The namespace to provision the resource in.
64
69
  The value should not contain leading or trailing forward slashes.
65
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
70
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
66
71
  *Available only for Vault Enterprise*.
67
72
  """
68
73
  return pulumi.get(self, "namespace")
@@ -83,7 +88,7 @@ class _PolicyState:
83
88
  :param pulumi.Input[str] name: The name of the policy
84
89
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
85
90
  The value should not contain leading or trailing forward slashes.
86
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
91
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
87
92
  *Available only for Vault Enterprise*.
88
93
  :param pulumi.Input[str] policy: String containing a Vault policy
89
94
  """
@@ -112,7 +117,7 @@ class _PolicyState:
112
117
  """
113
118
  The namespace to provision the resource in.
114
119
  The value should not contain leading or trailing forward slashes.
115
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
120
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
116
121
  *Available only for Vault Enterprise*.
117
122
  """
118
123
  return pulumi.get(self, "namespace")
@@ -157,7 +162,7 @@ class Policy(pulumi.CustomResource):
157
162
  :param pulumi.Input[str] name: The name of the policy
158
163
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
159
164
  The value should not contain leading or trailing forward slashes.
160
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
165
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
161
166
  *Available only for Vault Enterprise*.
162
167
  :param pulumi.Input[str] policy: String containing a Vault policy
163
168
  """
@@ -231,7 +236,7 @@ class Policy(pulumi.CustomResource):
231
236
  :param pulumi.Input[str] name: The name of the policy
232
237
  :param pulumi.Input[str] namespace: The namespace to provision the resource in.
233
238
  The value should not contain leading or trailing forward slashes.
234
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
239
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
235
240
  *Available only for Vault Enterprise*.
236
241
  :param pulumi.Input[str] policy: String containing a Vault policy
237
242
  """
@@ -258,7 +263,7 @@ class Policy(pulumi.CustomResource):
258
263
  """
259
264
  The namespace to provision the resource in.
260
265
  The value should not contain leading or trailing forward slashes.
261
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
266
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
262
267
  *Available only for Vault Enterprise*.
263
268
  """
264
269
  return pulumi.get(self, "namespace")
pulumi_vault/provider.py CHANGED
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from . import _utilities
11
16
  from ._inputs import *
12
17
 
@@ -49,7 +54,6 @@ class ProviderArgs:
49
54
  The set of arguments for constructing a Provider resource.
50
55
  :param pulumi.Input[str] address: URL of the root of the target Vault server.
51
56
  :param pulumi.Input[str] token: Token to use to authenticate to Vault.
52
- :param pulumi.Input[str] add_address_to_env: If true, adds the value of the `address` argument to the Terraform process environment.
53
57
  :param pulumi.Input['ProviderAuthLoginArgs'] auth_login: Login to vault with an existing auth method using auth/<mount>/login
54
58
  :param pulumi.Input['ProviderAuthLoginAwsArgs'] auth_login_aws: Login to vault using the AWS method
55
59
  :param pulumi.Input['ProviderAuthLoginAzureArgs'] auth_login_azure: Login to vault using the azure method
@@ -174,9 +178,6 @@ class ProviderArgs:
174
178
  @property
175
179
  @pulumi.getter(name="addAddressToEnv")
176
180
  def add_address_to_env(self) -> Optional[pulumi.Input[str]]:
177
- """
178
- If true, adds the value of the `address` argument to the Terraform process environment.
179
- """
180
181
  return pulumi.get(self, "add_address_to_env")
181
182
 
182
183
  @add_address_to_env.setter
@@ -353,13 +354,11 @@ class ProviderArgs:
353
354
 
354
355
  @property
355
356
  @pulumi.getter(name="clientAuth")
357
+ @_utilities.deprecated("""Use auth_login_cert instead""")
356
358
  def client_auth(self) -> Optional[pulumi.Input['ProviderClientAuthArgs']]:
357
359
  """
358
360
  Client authentication credentials.
359
361
  """
360
- warnings.warn("""Use auth_login_cert instead""", DeprecationWarning)
361
- pulumi.log.warn("""client_auth is deprecated: Use auth_login_cert instead""")
362
-
363
362
  return pulumi.get(self, "client_auth")
364
363
 
365
364
  @client_auth.setter
@@ -519,22 +518,22 @@ class Provider(pulumi.ProviderResource):
519
518
  opts: Optional[pulumi.ResourceOptions] = None,
520
519
  add_address_to_env: Optional[pulumi.Input[str]] = None,
521
520
  address: Optional[pulumi.Input[str]] = None,
522
- auth_login: Optional[pulumi.Input[pulumi.InputType['ProviderAuthLoginArgs']]] = None,
523
- auth_login_aws: Optional[pulumi.Input[pulumi.InputType['ProviderAuthLoginAwsArgs']]] = None,
524
- auth_login_azure: Optional[pulumi.Input[pulumi.InputType['ProviderAuthLoginAzureArgs']]] = None,
525
- auth_login_cert: Optional[pulumi.Input[pulumi.InputType['ProviderAuthLoginCertArgs']]] = None,
526
- auth_login_gcp: Optional[pulumi.Input[pulumi.InputType['ProviderAuthLoginGcpArgs']]] = None,
527
- auth_login_jwt: Optional[pulumi.Input[pulumi.InputType['ProviderAuthLoginJwtArgs']]] = None,
528
- auth_login_kerberos: Optional[pulumi.Input[pulumi.InputType['ProviderAuthLoginKerberosArgs']]] = None,
529
- auth_login_oci: Optional[pulumi.Input[pulumi.InputType['ProviderAuthLoginOciArgs']]] = None,
530
- auth_login_oidc: Optional[pulumi.Input[pulumi.InputType['ProviderAuthLoginOidcArgs']]] = None,
531
- auth_login_radius: Optional[pulumi.Input[pulumi.InputType['ProviderAuthLoginRadiusArgs']]] = None,
532
- auth_login_token_file: Optional[pulumi.Input[pulumi.InputType['ProviderAuthLoginTokenFileArgs']]] = None,
533
- auth_login_userpass: Optional[pulumi.Input[pulumi.InputType['ProviderAuthLoginUserpassArgs']]] = None,
521
+ auth_login: Optional[pulumi.Input[Union['ProviderAuthLoginArgs', 'ProviderAuthLoginArgsDict']]] = None,
522
+ auth_login_aws: Optional[pulumi.Input[Union['ProviderAuthLoginAwsArgs', 'ProviderAuthLoginAwsArgsDict']]] = None,
523
+ auth_login_azure: Optional[pulumi.Input[Union['ProviderAuthLoginAzureArgs', 'ProviderAuthLoginAzureArgsDict']]] = None,
524
+ auth_login_cert: Optional[pulumi.Input[Union['ProviderAuthLoginCertArgs', 'ProviderAuthLoginCertArgsDict']]] = None,
525
+ auth_login_gcp: Optional[pulumi.Input[Union['ProviderAuthLoginGcpArgs', 'ProviderAuthLoginGcpArgsDict']]] = None,
526
+ auth_login_jwt: Optional[pulumi.Input[Union['ProviderAuthLoginJwtArgs', 'ProviderAuthLoginJwtArgsDict']]] = None,
527
+ auth_login_kerberos: Optional[pulumi.Input[Union['ProviderAuthLoginKerberosArgs', 'ProviderAuthLoginKerberosArgsDict']]] = None,
528
+ auth_login_oci: Optional[pulumi.Input[Union['ProviderAuthLoginOciArgs', 'ProviderAuthLoginOciArgsDict']]] = None,
529
+ auth_login_oidc: Optional[pulumi.Input[Union['ProviderAuthLoginOidcArgs', 'ProviderAuthLoginOidcArgsDict']]] = None,
530
+ auth_login_radius: Optional[pulumi.Input[Union['ProviderAuthLoginRadiusArgs', 'ProviderAuthLoginRadiusArgsDict']]] = None,
531
+ auth_login_token_file: Optional[pulumi.Input[Union['ProviderAuthLoginTokenFileArgs', 'ProviderAuthLoginTokenFileArgsDict']]] = None,
532
+ auth_login_userpass: Optional[pulumi.Input[Union['ProviderAuthLoginUserpassArgs', 'ProviderAuthLoginUserpassArgsDict']]] = None,
534
533
  ca_cert_dir: Optional[pulumi.Input[str]] = None,
535
534
  ca_cert_file: Optional[pulumi.Input[str]] = None,
536
- client_auth: Optional[pulumi.Input[pulumi.InputType['ProviderClientAuthArgs']]] = None,
537
- headers: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['ProviderHeaderArgs']]]]] = None,
535
+ client_auth: Optional[pulumi.Input[Union['ProviderClientAuthArgs', 'ProviderClientAuthArgsDict']]] = None,
536
+ headers: Optional[pulumi.Input[Sequence[pulumi.Input[Union['ProviderHeaderArgs', 'ProviderHeaderArgsDict']]]]] = None,
538
537
  max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
539
538
  max_retries: Optional[pulumi.Input[int]] = None,
540
539
  max_retries_ccc: Optional[pulumi.Input[int]] = None,
@@ -556,24 +555,23 @@ class Provider(pulumi.ProviderResource):
556
555
 
557
556
  :param str resource_name: The name of the resource.
558
557
  :param pulumi.ResourceOptions opts: Options for the resource.
559
- :param pulumi.Input[str] add_address_to_env: If true, adds the value of the `address` argument to the Terraform process environment.
560
558
  :param pulumi.Input[str] address: URL of the root of the target Vault server.
561
- :param pulumi.Input[pulumi.InputType['ProviderAuthLoginArgs']] auth_login: Login to vault with an existing auth method using auth/<mount>/login
562
- :param pulumi.Input[pulumi.InputType['ProviderAuthLoginAwsArgs']] auth_login_aws: Login to vault using the AWS method
563
- :param pulumi.Input[pulumi.InputType['ProviderAuthLoginAzureArgs']] auth_login_azure: Login to vault using the azure method
564
- :param pulumi.Input[pulumi.InputType['ProviderAuthLoginCertArgs']] auth_login_cert: Login to vault using the cert method
565
- :param pulumi.Input[pulumi.InputType['ProviderAuthLoginGcpArgs']] auth_login_gcp: Login to vault using the gcp method
566
- :param pulumi.Input[pulumi.InputType['ProviderAuthLoginJwtArgs']] auth_login_jwt: Login to vault using the jwt method
567
- :param pulumi.Input[pulumi.InputType['ProviderAuthLoginKerberosArgs']] auth_login_kerberos: Login to vault using the kerberos method
568
- :param pulumi.Input[pulumi.InputType['ProviderAuthLoginOciArgs']] auth_login_oci: Login to vault using the OCI method
569
- :param pulumi.Input[pulumi.InputType['ProviderAuthLoginOidcArgs']] auth_login_oidc: Login to vault using the oidc method
570
- :param pulumi.Input[pulumi.InputType['ProviderAuthLoginRadiusArgs']] auth_login_radius: Login to vault using the radius method
571
- :param pulumi.Input[pulumi.InputType['ProviderAuthLoginTokenFileArgs']] auth_login_token_file: Login to vault using
572
- :param pulumi.Input[pulumi.InputType['ProviderAuthLoginUserpassArgs']] auth_login_userpass: Login to vault using the userpass method
559
+ :param pulumi.Input[Union['ProviderAuthLoginArgs', 'ProviderAuthLoginArgsDict']] auth_login: Login to vault with an existing auth method using auth/<mount>/login
560
+ :param pulumi.Input[Union['ProviderAuthLoginAwsArgs', 'ProviderAuthLoginAwsArgsDict']] auth_login_aws: Login to vault using the AWS method
561
+ :param pulumi.Input[Union['ProviderAuthLoginAzureArgs', 'ProviderAuthLoginAzureArgsDict']] auth_login_azure: Login to vault using the azure method
562
+ :param pulumi.Input[Union['ProviderAuthLoginCertArgs', 'ProviderAuthLoginCertArgsDict']] auth_login_cert: Login to vault using the cert method
563
+ :param pulumi.Input[Union['ProviderAuthLoginGcpArgs', 'ProviderAuthLoginGcpArgsDict']] auth_login_gcp: Login to vault using the gcp method
564
+ :param pulumi.Input[Union['ProviderAuthLoginJwtArgs', 'ProviderAuthLoginJwtArgsDict']] auth_login_jwt: Login to vault using the jwt method
565
+ :param pulumi.Input[Union['ProviderAuthLoginKerberosArgs', 'ProviderAuthLoginKerberosArgsDict']] auth_login_kerberos: Login to vault using the kerberos method
566
+ :param pulumi.Input[Union['ProviderAuthLoginOciArgs', 'ProviderAuthLoginOciArgsDict']] auth_login_oci: Login to vault using the OCI method
567
+ :param pulumi.Input[Union['ProviderAuthLoginOidcArgs', 'ProviderAuthLoginOidcArgsDict']] auth_login_oidc: Login to vault using the oidc method
568
+ :param pulumi.Input[Union['ProviderAuthLoginRadiusArgs', 'ProviderAuthLoginRadiusArgsDict']] auth_login_radius: Login to vault using the radius method
569
+ :param pulumi.Input[Union['ProviderAuthLoginTokenFileArgs', 'ProviderAuthLoginTokenFileArgsDict']] auth_login_token_file: Login to vault using
570
+ :param pulumi.Input[Union['ProviderAuthLoginUserpassArgs', 'ProviderAuthLoginUserpassArgsDict']] auth_login_userpass: Login to vault using the userpass method
573
571
  :param pulumi.Input[str] ca_cert_dir: Path to directory containing CA certificate files to validate the server's certificate.
574
572
  :param pulumi.Input[str] ca_cert_file: Path to a CA certificate file to validate the server's certificate.
575
- :param pulumi.Input[pulumi.InputType['ProviderClientAuthArgs']] client_auth: Client authentication credentials.
576
- :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['ProviderHeaderArgs']]]] headers: The headers to send with each Vault request.
573
+ :param pulumi.Input[Union['ProviderClientAuthArgs', 'ProviderClientAuthArgsDict']] client_auth: Client authentication credentials.
574
+ :param pulumi.Input[Sequence[pulumi.Input[Union['ProviderHeaderArgs', 'ProviderHeaderArgsDict']]]] headers: The headers to send with each Vault request.
577
575
  :param pulumi.Input[int] max_lease_ttl_seconds: Maximum TTL for secret leases requested by this provider.
578
576
  :param pulumi.Input[int] max_retries: Maximum number of retries when a 5xx error code is encountered.
579
577
  :param pulumi.Input[int] max_retries_ccc: Maximum number of retries for Client Controlled Consistency related operations
@@ -617,22 +615,22 @@ class Provider(pulumi.ProviderResource):
617
615
  opts: Optional[pulumi.ResourceOptions] = None,
618
616
  add_address_to_env: Optional[pulumi.Input[str]] = None,
619
617
  address: Optional[pulumi.Input[str]] = None,
620
- auth_login: Optional[pulumi.Input[pulumi.InputType['ProviderAuthLoginArgs']]] = None,
621
- auth_login_aws: Optional[pulumi.Input[pulumi.InputType['ProviderAuthLoginAwsArgs']]] = None,
622
- auth_login_azure: Optional[pulumi.Input[pulumi.InputType['ProviderAuthLoginAzureArgs']]] = None,
623
- auth_login_cert: Optional[pulumi.Input[pulumi.InputType['ProviderAuthLoginCertArgs']]] = None,
624
- auth_login_gcp: Optional[pulumi.Input[pulumi.InputType['ProviderAuthLoginGcpArgs']]] = None,
625
- auth_login_jwt: Optional[pulumi.Input[pulumi.InputType['ProviderAuthLoginJwtArgs']]] = None,
626
- auth_login_kerberos: Optional[pulumi.Input[pulumi.InputType['ProviderAuthLoginKerberosArgs']]] = None,
627
- auth_login_oci: Optional[pulumi.Input[pulumi.InputType['ProviderAuthLoginOciArgs']]] = None,
628
- auth_login_oidc: Optional[pulumi.Input[pulumi.InputType['ProviderAuthLoginOidcArgs']]] = None,
629
- auth_login_radius: Optional[pulumi.Input[pulumi.InputType['ProviderAuthLoginRadiusArgs']]] = None,
630
- auth_login_token_file: Optional[pulumi.Input[pulumi.InputType['ProviderAuthLoginTokenFileArgs']]] = None,
631
- auth_login_userpass: Optional[pulumi.Input[pulumi.InputType['ProviderAuthLoginUserpassArgs']]] = None,
618
+ auth_login: Optional[pulumi.Input[Union['ProviderAuthLoginArgs', 'ProviderAuthLoginArgsDict']]] = None,
619
+ auth_login_aws: Optional[pulumi.Input[Union['ProviderAuthLoginAwsArgs', 'ProviderAuthLoginAwsArgsDict']]] = None,
620
+ auth_login_azure: Optional[pulumi.Input[Union['ProviderAuthLoginAzureArgs', 'ProviderAuthLoginAzureArgsDict']]] = None,
621
+ auth_login_cert: Optional[pulumi.Input[Union['ProviderAuthLoginCertArgs', 'ProviderAuthLoginCertArgsDict']]] = None,
622
+ auth_login_gcp: Optional[pulumi.Input[Union['ProviderAuthLoginGcpArgs', 'ProviderAuthLoginGcpArgsDict']]] = None,
623
+ auth_login_jwt: Optional[pulumi.Input[Union['ProviderAuthLoginJwtArgs', 'ProviderAuthLoginJwtArgsDict']]] = None,
624
+ auth_login_kerberos: Optional[pulumi.Input[Union['ProviderAuthLoginKerberosArgs', 'ProviderAuthLoginKerberosArgsDict']]] = None,
625
+ auth_login_oci: Optional[pulumi.Input[Union['ProviderAuthLoginOciArgs', 'ProviderAuthLoginOciArgsDict']]] = None,
626
+ auth_login_oidc: Optional[pulumi.Input[Union['ProviderAuthLoginOidcArgs', 'ProviderAuthLoginOidcArgsDict']]] = None,
627
+ auth_login_radius: Optional[pulumi.Input[Union['ProviderAuthLoginRadiusArgs', 'ProviderAuthLoginRadiusArgsDict']]] = None,
628
+ auth_login_token_file: Optional[pulumi.Input[Union['ProviderAuthLoginTokenFileArgs', 'ProviderAuthLoginTokenFileArgsDict']]] = None,
629
+ auth_login_userpass: Optional[pulumi.Input[Union['ProviderAuthLoginUserpassArgs', 'ProviderAuthLoginUserpassArgsDict']]] = None,
632
630
  ca_cert_dir: Optional[pulumi.Input[str]] = None,
633
631
  ca_cert_file: Optional[pulumi.Input[str]] = None,
634
- client_auth: Optional[pulumi.Input[pulumi.InputType['ProviderClientAuthArgs']]] = None,
635
- headers: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['ProviderHeaderArgs']]]]] = None,
632
+ client_auth: Optional[pulumi.Input[Union['ProviderClientAuthArgs', 'ProviderClientAuthArgsDict']]] = None,
633
+ headers: Optional[pulumi.Input[Sequence[pulumi.Input[Union['ProviderHeaderArgs', 'ProviderHeaderArgsDict']]]]] = None,
636
634
  max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
637
635
  max_retries: Optional[pulumi.Input[int]] = None,
638
636
  max_retries_ccc: Optional[pulumi.Input[int]] = None,
@@ -703,9 +701,6 @@ class Provider(pulumi.ProviderResource):
703
701
  @property
704
702
  @pulumi.getter(name="addAddressToEnv")
705
703
  def add_address_to_env(self) -> pulumi.Output[Optional[str]]:
706
- """
707
- If true, adds the value of the `address` argument to the Terraform process environment.
708
- """
709
704
  return pulumi.get(self, "add_address_to_env")
710
705
 
711
706
  @property
@@ -1,4 +1,5 @@
1
1
  {
2
2
  "resource": true,
3
- "name": "vault"
3
+ "name": "vault",
4
+ "version": "6.5.0-alpha.1736836139"
4
5
  }